Shadow APK Crypter
☆12May 31, 2025Updated 9 months ago
Alternatives and similar repositories for shadow_apk_crypter
Users that are interested in shadow_apk_crypter are comparing it to the libraries listed below
Sorting:
- ☆21Apr 12, 2024Updated last year
- ☆12May 12, 2024Updated last year
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Telegram Bot that you can check if you have an account that has been compromised in any public data breaches☆16Jan 8, 2026Updated last month
- Official Black Hat Arsenal Security Tools Repository☆13Aug 12, 2017Updated 8 years ago
- The media player for language learning, with dual subtitles, AI-generated subtitles, realtime-OCR, translation, word lookup, and more!☆14Apr 27, 2025Updated 10 months ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆10Feb 17, 2023Updated 3 years ago
- Create custom Autorun.inf for removable media☆12Apr 8, 2019Updated 6 years ago
- Suna - Open Source Generalist AI Agent☆13Apr 29, 2025Updated 10 months ago
- Digispark Overmaster free IDE TOOL allows to create and edit Digispark Scripts by the drag and drop technique,with cool GUI and easy to u…☆13Mar 5, 2023Updated 3 years ago
- ☆18Sep 22, 2024Updated last year
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.☆23Sep 29, 2024Updated last year
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- ☆15Apr 12, 2024Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- Simple Ransomware using Python PyQt5 and Cryptography libraries. You can make the design you want using the design files.☆14Jun 11, 2022Updated 3 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC☆16Feb 16, 2024Updated 2 years ago
- A Flutter widget to enter passcodes.☆20Nov 11, 2018Updated 7 years ago
- This app provides a fast and simple way to check if your android device is rooted, with just a single click.☆16Dec 7, 2018Updated 7 years ago
- ☆20Jan 14, 2026Updated last month
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆13Jan 28, 2023Updated 3 years ago
- Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks. Version > 80 is supported.☆13Jun 5, 2020Updated 5 years ago
- USB Security Software. Call the Knight to fight Malware Spread.☆14Jan 6, 2021Updated 5 years ago
- Automated CIS Benchmark Compliance Remediation for Windows 11 Enterprise with Ansible☆35May 5, 2025Updated 10 months ago
- Snap of Audacity: Audio software for multi-track recording and editing☆22Dec 15, 2025Updated 2 months ago
- This tool is great for information gathering and post- exploitation☆16Jul 20, 2021Updated 4 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Feb 12, 2026Updated 3 weeks ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- MABEL: Malware Analysis Benchmark for Artificial Intelligence and Machine Learning☆30Oct 15, 2025Updated 4 months ago
- 🚀 Advanced automated Gmail account creation tool with anti-detection, phone verification bypass, 5sim integration, and beautiful modern …☆261Jan 15, 2026Updated last month
- Configurable and notification aware autostart helper for minimalistic window managers like i3, openbox and others☆32Oct 17, 2024Updated last year
- NjRAT is a Remote Administration Tool. This repository contains a Njrat Editions.☆27Nov 23, 2022Updated 3 years ago
- Make a bad usb out of any USB drive☆21Nov 9, 2018Updated 7 years ago
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- A host-based IDS and network monitoring system (My graduation project)☆26Jul 6, 2021Updated 4 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Security feed, done in the stupid simple way☆27Jan 8, 2025Updated last year
- Open-source windows ransomware created for educational purposes☆22Jan 24, 2021Updated 5 years ago